共 50 条
- [1] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
- [2] Pollution Attacks Identification in Structured P2P Overlay Networks [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
- [4] Sybil Resilient Identity Distribution in P2P Networks [J]. PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 433 - 439
- [5] A Framework for Monitoring and Mitigating Malicious Attacks in Structured P2P Overlay Networks [J]. 2017 IEEE/ACS 14TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2017, : 128 - 134
- [6] ID mapping attacks in P2P networks [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1785 - 1790
- [7] SyMon: Defending Large Structured P2P Systems Against Sybil Attack [J]. 2009 IEEE NINTH INTERNATIONAL CONFERENCE ON PEER-TO-PEER COMPUTING (P2P 2009), 2009, : 21 - 30
- [10] Efficient broadcast in structured P2P networks [J]. PEER-TO-PEER SYSTEMS II, 2003, 2735 : 304 - 314